Back to Home
Sarks0 icon

binary-mcp

Verified Safe

by Sarks0

Overview

Provides AI assistants with binary analysis capabilities via Ghidra, ILSpyCmd, and x64dbg for security research and reverse engineering.

Installation

Run Command
uv --directory /absolute/path/to/binary-mcp run python -m src.server

Environment Variables

  • GHIDRA_HOME
  • GHIDRA_TIMEOUT
  • GHIDRA_FUNCTION_TIMEOUT
  • GHIDRA_MAX_FUNCTIONS
  • GHIDRA_SKIP_DECOMPILE
  • X64DBG_HOST
  • X64DBG_PORT
  • X64DBG_TIMEOUT
  • VT_API_KEY

Security Notes

The server demonstrates strong security awareness, especially regarding path traversal and command injection. It uses `sanitize_binary_path` and `sanitize_output_path` extensively, and `subprocess.run` calls are configured with `shell=False`. The x64dbg bridge communicates via localhost by default and uses a secure token. Inputs are validated (e.g., `validate_dotnet_type_name`, `safe_regex_compile`). Running external binaries and processing untrusted inputs inherently carries risks, but this project takes substantial measures to mitigate them. Default output directories are within the user's home directory.

Similar Servers

Stats

Interest Score32
Security Score9
Cost ClassHigh
Avg Tokens1000
Stars2
Forks1
Last Update2026-01-19

Tags

securityreverse-engineeringmalware-analysisstatic-analysisdynamic-analysisghidrax64dbgdotnetpython